10 Mobile Security Myths Debunked

Dangerous misconceptions about smartphone security that leave Hong Kong users unnecessarily exposed — each myth examined, the truth explained, and the correct action to take.

Mobile security myths debunked
1Platform Myths

Myth 1–3: Platform Security Misconceptions

Myth 1: "iPhones can't get viruses or malware." This is perhaps the most dangerous mobile security myth in to Do If Your Phone Is Lost or Stolen in Hong Kong">Hong Kong. While iOS's closed ecosystem and mandatory App Store review process significantly reduce the malware risk compared to Android, iPhones are absolutely not immune. Apple's own security bulletins regularly patch critical vulnerabilities. Zero-click exploits — like those used by Pegasus spyware — have compromised iPhones without any user interaction. Apps that pass App Store review have been caught doing malicious things after a delayed activation period. And sophisticated phishing sites targeting iPhone users can harvest credentials just as effectively as on Android. The correct framing is: iOS provides structural advantages that reduce (not eliminate) malware risk. Security settings, updates, and vigilance are still essential.

Myth 2: "Android is fundamentally less secure than iOS." Android's security architecture — SELinux, Verified Boot, Titan M2 chip on Pixel devices, Android Enterprise — is sophisticated and comparable to iOS. The security gap between the platforms is not architectural but practical: Android's openness allows sideloading, creating a malware distribution channel that doesn't exist on iOS; and Android's fragmentation means many Android devices receive infrequent or no security updates. A Google Pixel 9 Pro running the latest Android and security patches is highly secure. A HK$800 Android phone running Android 11 with no security patches since 2022 is not. The device and manufacturer matter enormously.

Myth 3: "Jailbreaking/rooting How to Spot and Avoid Attacks on Your Phone">your phone doesn't affect security." Jailbreaking (iOS) and rooting (Android) fundamentally compromise the security model of the operating system. These processes bypass the verified boot chain, disable system integrity protections, and allow any app to gain root access to the entire device — including reading all other apps' data, accessing the encryption keys stored in the Secure Enclave or Trusted Execution Environment, and disabling security features. Jailbroken and rooted devices cannot be considered secure and should not be used for banking, corporate access, or any security-sensitive purpose. Additionally, jailbroken iPhones cannot receive standard iOS security updates.

  • Truth 1: iPhones can be compromised — update promptly, avoid suspicious links, and apply all security settings just as you would on Android.
  • Truth 2: Android security quality varies entirely by device — flagship Pixel and Samsung devices are highly secure; cheap unupdated devices are not.
  • Truth 3: Jailbreaking and rooting eliminate the security architecture that protects your data — avoid both for any device used for sensitive activities.
  • Update regardless of platform: Both iOS and Android require timely security updates — no platform protects against vulnerabilities that haven't been patched.
  • Both platforms face phishing: Smishing, vishing, and fake website attacks target users of both platforms with equal effectiveness — phishing doesn't care what OS you use.
  • App permissions matter on both: Regardless of platform, apps with excessive permissions represent a privacy and security risk — audit permissions on both iOS and Android.
Read the full iOS vs Android security comparison →
Mobile security platform myths debunked
2App and Network Myths

Myth 4–6: App Store and Network Misconceptions

Myth 4: "An app on the App Store or Google Play is safe." Both app stores perform security screening, but neither is foolproof. Malicious apps periodically pass both Apple's and Google's review processes, using techniques like delayed activation of malicious code (activating the harmful behaviour only after the app has been approved), disguised malware using obfuscated code, and apps that are initially benign but add malicious functionality via remote configuration after approval. Google's Play Store has historically had more issues than the App Store, but both have published malicious apps. Checking an app's developer reputation, privacy policy, review authenticity, and permission requests before installing is always warranted regardless of the app source.

Myth 5: "HTTPS means the website is safe." The HTTPS padlock icon tells you only that the Difference and the Connection">the connection between your browser and the server is encrypted in transit — it says absolutely nothing about whether the website is legitimate, whether it will steal your credentials, or whether the server it connects to is controlled by an attacker. Phishing sites use HTTPS routinely and easily — obtaining a free SSL certificate from Let's Encrypt takes minutes. In 2026, the majority of phishing websites use HTTPS. The padlock is a necessary but far-from-sufficient indicator of a site's legitimacy; always verify the actual domain name, not just the padlock status.

Myth 6: "Public WiFi is safe if I don't do anything sensitive." The definition of "sensitive" is broader than most users appreciate. While avoiding online banking on public WiFi is sound advice, most internet usage involves some sensitive data: social media sessions have authentication tokens that can be hijacked, email apps maintain persistent login sessions, messaging apps may expose contact lists if traffic is unencrypted, and even browsing history is information you may not want to share. Additionally, simply connecting to a malicious access point can expose your device to network-level attacks that don't require you to take any specific action. Using a VPN on all public WiFi networks is the correct approach — not just when performing explicitly sensitive tasks.

  • Truth 4: App Store and Google Play screening reduces but doesn't eliminate malware — research any app before installing and maintain a sceptical posture.
  • Truth 5: HTTPS encrypts the connection, not the trustworthiness of the site — phishing sites use HTTPS. Always verify the actual domain name.
  • Truth 6: All public WiFi is potentially risky — use a VPN for all public network usage, not just banking sessions.
  • Password managers prevent phishing: A password manager that autofills only on the correct registered domain won't fill your bank password on a lookalike phishing site — one of the best defences against fake websites.
  • VPN encrypts everything: A mobile VPN doesn't just protect "sensitive" traffic — it encrypts all traffic, preventing wholesale surveillance of your activity on any network.
  • Developer research matters: Before installing any app, search the developer's name, check their website and privacy policy, and look for news about their data practices.
Why you need a VPN on all public networks →
App and network security myths
3Password and Authentication Myths

Myth 7–8: Password and Authentication Misconceptions

Myth 7: "Fingerprint and Face ID are enough — I don't need a strong passcode." Biometric authentication is convenient and provides a good balance of security and usability, but it's not the primary security mechanism for your device's data. Your passcode is the root credential from which your device's encryption keys are derived — biometrics are simply a shortcut that bypasses passcode entry for convenience. The strength of your passcode directly determines the strength of your encryption. A 4-digit PIN used as the underlying passcode for Face ID means your device's encryption is only as strong as a 4-digit PIN — attackers who can compel biometric authentication (e.g., via "rubber hose cryptanalysis") can also potentially brute-force a weak PIN forensically if they obtain the device.

Myth 8: "SMS two-factor authentication makes my account secure." SMS 2FA is better than password-only authentication, but it's the weakest form of 2FA and has significant documented vulnerabilities in Hong Kong's context. SIM swapping attacks — where an attacker transfers your phone number to their SIM by social engineering your carrier — bypass SMS 2FA entirely. Real-time phishing proxies relay your SMS codes to the attacker instantaneously. SS7 network vulnerabilities can allow SMS interception without carrier involvement. For any account of real value — banking, email, cloud storage — migrate from SMS 2FA to an authenticator app (TOTP) as a minimum standard, with hardware security keys or passkeys as the highest-security option.

An important related misconception: "I don't need 2FA because I have a unique password for each account." Unique passwords are excellent practice and prevent credential stuffing, but they don't protect against phishing (which captures your correct password directly), keyloggers, or data breaches that expose password hashes which can be cracked offline. Two-factor authentication adds an independent second layer that remains effective even when the first layer (the password) has been compromised. Both unique passwords and 2FA are necessary — neither alone is sufficient.

  • Truth 7: Biometrics are a shortcut, not a security upgrade — your passcode is the root credential. Use a strong alphanumeric passcode as the underlying credential.
  • Truth 8: SMS 2FA is bypassed by SIM swap and real-time phishing — use an authenticator app for TOTP 2FA as the minimum acceptable standard.
  • Passkeys are better than both: Where supported, passkeys replace both passwords and 2FA codes with a single phishing-resistant credential — adopt them where available.
  • Recovery codes matter: Save 2FA recovery codes when setting up authenticator app 2FA — losing your phone without recovery codes can permanently lock you out.
  • Password managers are essential: Using unique passwords for every account requires a password manager — attempting to remember them leads inevitably to reuse.
  • Email is the master key: Your email account's security determines the security of every other account — prioritise strong 2FA on email above all other accounts.
Move from SMS 2FA to authenticator app 2FA →
Password and authentication myths
4Reset, Antivirus, and Other Myths

Myth 9–10: Factory Reset and Antivirus Misconceptions

Myth 9: "A factory reset completely removes all data from my phone." This is partially true for current devices but was notably false for older Android devices. On modern iPhones (with Secure Enclave) and modern Android devices using file-based encryption, a factory reset does effectively destroy your data by cryptographically shredding the encryption keys — the data physically remains on the storage chips but is permanently unreadable without the destroyed keys. However, several caveats apply: data that has been backed up to cloud services (iCloud, Google Drive) is not deleted by the phone reset; data shared with third-party apps that have their own cloud storage is not deleted; and on older Android devices (pre-2015 without hardware encryption), factory reset left data recoverable by specialist forensic tools.

Myth 10: "I need a mobile antivirus app to stay safe." On modern iOS, third-party "antivirus" apps cannot actually scan the device for malware — Apple's sandboxing model prevents any app from accessing other apps' data or the system file structure in the way a real antivirus scanner needs to. iOS antivirus apps are essentially marketing products that offer VPN, phishing URL checking (which Safari already does), and password management features rebranded as security. On Android, Google Play Protect is a real, continuously updated malware detection system built into the OS — for most users, this combined with good app hygiene (install only from Play Store) provides adequate protection. Third-party Android antivirus apps from reputable vendors (Malwarebytes, Bitdefender) provide marginal additional benefit for average users but are legitimate products unlike their iOS equivalents.

A final myth worth addressing: "I have nothing to hide, so I don't need to worry about mobile security." This argument conflates privacy (a right) with criminality. Your smartphone data enables fraud, identity theft, blackmail, and physical harm — not because you're a criminal, but because your data is valuable to criminals. The photos on your phone, your banking details, your location history, your private messages, and your authentication credentials all have significant value to malicious actors regardless of the content's legal status. Privacy and security are about protecting your interests and safety, not hiding wrongdoing.

  • Truth 9: Modern encrypted phones shred data on factory reset via key destruction — but cloud backups are not deleted. Always review and delete cloud backups separately.
  • Truth 10: iOS "antivirus" apps cannot actually scan for malware due to sandboxing — they are marketing products. Android users benefit from Play Protect; third-party antivirus provides marginal additional protection.
  • "Nothing to hide" fallacy: Mobile security protects against fraud, identity theft, and physical harm — relevant to everyone regardless of their online behaviour.
  • Before selling your phone: Factory reset + erase all content (iOS) or factory reset with encryption (Android) is sufficient for modern devices — but always restore to a clean state and verify the reset completed before handover.
  • Cloud data survives device reset: Delete your Google Photos, Google Drive, iCloud Photos, and other cloud backups explicitly before selling or giving away a device.
  • Account deregistration: Before selling an iPhone, sign out of Apple ID (Settings → [Name] → Sign Out) to remove Activation Lock — without this, the next owner cannot use the device.
Apply evidence-based smartphone security practices →
Factory reset antivirus myths debunked
Now You Know the Facts — Act on Them

Now You Know the Facts — Act on Them

With the myths debunked, follow our evidence-based smartphone security guide to configure every setting that actually matters for your protection.

Related VPN Articles